Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 22:44
Static task
static1
Behavioral task
behavioral1
Sample
85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe
Resource
win10v2004-20231023-en
General
-
Target
85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe
-
Size
816KB
-
MD5
81d9cb4ae8523b45fab3ddb4080db2f0
-
SHA1
4ad5b00d44884e2f0ae1c3924dcb04699d81c222
-
SHA256
85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec
-
SHA512
99e6a914965090f7c2b1cfef177c3fc6e4544c8299a812ba9103db02fd033f57f2c2dcfe634ce8b5d47e4e29824655c6807d2bfbf983b6c23b0902a5ecdbe09b
-
SSDEEP
24576:kY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG90:53XZynV4oDabuWbDQOcIxJJ90
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2724 1E0A0A0D120C156D155C15E0C0C160F0B160D.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2936 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 2724 1E0A0A0D120C156D155C15E0C0C160F0B160D.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2724 2936 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 88 PID 2936 wrote to memory of 2724 2936 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 88 PID 2936 wrote to memory of 2724 2936 85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe"C:\Users\Admin\AppData\Local\Temp\85e6a36d7e8f125a64f74247c1176a390cb3e6d86fbb261ae8e030b65483d6ec.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\1E0A0A0D120C156D155C15E0C0C160F0B160D.exeC:\Users\Admin\AppData\Local\Temp\1E0A0A0D120C156D155C15E0C0C160F0B160D.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD592954d8f34228d251d1012ceca8a7ac1
SHA19fb4a7172b8dae02bce87a21ad25c524f6b5924d
SHA256c141458117b28f3613b35f8d4e703510d4f4f1f66e8c52ab582174c9147c8ee4
SHA512153423babeb3db837e807126c8cbb9308d753b0a822e2cb5a6a76eaf0e937e78bbfddabcb91045dff723d7f8115c99f62483114009d03aa735b197e6a4e33e99
-
Filesize
816KB
MD592954d8f34228d251d1012ceca8a7ac1
SHA19fb4a7172b8dae02bce87a21ad25c524f6b5924d
SHA256c141458117b28f3613b35f8d4e703510d4f4f1f66e8c52ab582174c9147c8ee4
SHA512153423babeb3db837e807126c8cbb9308d753b0a822e2cb5a6a76eaf0e937e78bbfddabcb91045dff723d7f8115c99f62483114009d03aa735b197e6a4e33e99